An individual pretending to be a consultant trying to gain access to information is an example
of which of the following?
A.
Chassis Intrusion
B.
Principle of Least Privilege
C.
Social Engineering
D.
Identity Theft
An individual pretending to be a consultant trying to gain access to information is an example
of which of the following?
An individual pretending to be a consultant trying to gain access to information is an example
of which of the following?
A.
Chassis Intrusion
B.
Principle of Least Privilege
C.
Social Engineering
D.
Identity Theft